Category: HelpnetSecurity

Jumio Liveness Premium combats deepfakes and injection attacks
18
Jun
2025

Jumio Liveness Premium combats deepfakes and injection attacks

Jumio launched Jumio Liveness Premium with advanced deepfake detection, the company’s most advanced biometric liveness detection solution to date. Jumio’s…

Chaining two LPEs to get "root": Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
18
Jun
2025

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)

Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CVE-2025-6019) that can be exploited in tandem to achieve root…

AI is changing cybersecurity roles, and entry-level jobs are at risk
18
Jun
2025

AI is changing cybersecurity roles, and entry-level jobs are at risk

Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging…

Dashlane’s AI model alerts businesses to phishing risks
18
Jun
2025

Dashlane’s AI model alerts businesses to phishing risks

Dashlane introduced AI phishing alerts, an advancement to the Dashlane Omnix platform that protects enterprises and users against threats targeting…

Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
18
Jun
2025

Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security

As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF,…

35 open-source security tools to power your red team, SOC, and cloud security
18
Jun
2025

35 open-source security tools to power your red team, SOC, and cloud security

This article showcases free, open-source security tools that support your organization’s teams in red teaming, threat hunting, incident response, vulnerability…

Employees are using AI where they know they shouldn’t
18
Jun
2025

Employees are using AI where they know they shouldn’t

Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according…

Researchers unearth keyloggers on Outlook login pages
17
Jun
2025

Researchers unearth keyloggers on Outlook login pages

Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of government organizations and companies around the world, and have injected…

Free AI coding security rules now available on GitHub
17
Jun
2025

Free AI coding security rules now available on GitHub

Developers are turning to AI coding assistants to save time and speed up their work. But these tools can also…

Sumsub Device Intelligence offers protection against identity threats
17
Jun
2025

Sumsub Device Intelligence offers protection against identity threats

Sumsub is expanding its Fraud Prevention solution with advanced Device Intelligence, enhanced by the Fingerprint platform. Designed to identify threats before…

CURBy: A quantum random number generator you can verify
17
Jun
2025

CURBy: A quantum random number generator you can verify

NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called…

Hackers love events. Why aren't more CISOs paying attention?
17
Jun
2025

Hackers love events. Why aren’t more CISOs paying attention?

When CISOs think about risk, they usually think about cloud platforms, laptops, and data centers. But live events like conferences,…